cubicle vs the coffee shop
play

Cubicle vs. the Coffee Shop Behavioral Modes in (Enterprise) - PowerPoint PPT Presentation

Cubicle vs. the Coffee Shop Behavioral Modes in (Enterprise) End-Users Frederic Giroire Jaideep Chandrashekar Gianluca Iannaccone Dina Papagiannaki Eve Schooler Nina Taft Intel Research/ INRIA Motivation Previous studies of user


  1. Cubicle vs. the Coffee Shop Behavioral Modes in (Enterprise) End-Users Frederic Giroire Jaideep Chandrashekar Gianluca Iannaccone Dina Papagiannaki Eve Schooler Nina Taft Intel Research/ INRIA

  2. Motivation • Previous studies of user profiles used traces collected “in-network” • Corporate networks today have 50-60% mobile hosts • When profile is constructed in one environment, how different in another? • Do profiles computed from “averaging” hold true in any of the environments? • Is there a canonical user profile? • What (statistics) change when users move? • Should user profiles care about location?

  3. Data • 350+ users, all running Windows XP SP2 custom build • Collection software (windump+custom app) ran on laptops and (few) desktops • Unique data-set (most traces collected in network) • Traces collected for ~5 weeks; s/w automatically deactivated • Traces periodically uploaded to central server

  4. Recruiting users • 1400+ people polled from across 3 business units • Up front and clear statement about intended use • Explicit consent-- software was installed by users • Traces are uploaded anonymously; filenames do not identify individual users • At central server: packets processed and payloads discarded • Amazon gift certificates given out as enticement

  5. Environments vpn • limited protection • moderately provisioned • limited access to inf. services enterprise inside • lots of protections outside • well provisioned • complete access to • no protection infrastructure services • badly provisioned • no access to inf. services

  6. Questions • How do users spend their time across environments • Are there very big differences in protocol activity across the environments • What are the differences in how various network services are used

  7. A month in the life of a laptop outside vpn inside

  8. A month in the life of a laptop outside vpn inside

  9. Environment Lifetimes Deskbound employees? carl alice road warriors? eve bob median time of “session” (avg. diff =85%)

  10. Questions • How do users spend their time across environments • Are there very big differences in protocol activity across the environments • Differences in how various network services are used

  11. TCP usage (connections) carl alice eve bob thresh. inside thresh. outside 95th %-ile of connections/15 mins

  12. Variation creates “exploit gap” static thresholds Current security allow a larger operating region for ignore location mechanisms malicious traffic to go undetected context detector threshold exploit gap #Connections at work at home Time ➞

  13. Variation creates “exploit gap” static thresholds Current security allow a larger operating region for ignore location mechanisms malicious traffic to go undetected context detector threshold exploit gap #Connections examples (conns/min) Zapchast (0-20) SDbot C&C (0-50) at work at home Time ➞

  14. Questions • How do users spend their time across environments • Are there differences in protocol activity across the environments • Differences in how various network services are used

  15. Network Services (ports) eve carl alice bob relatively more http traffic when INSIDE fraction of connections for web traffic (80,8080,8888)

  16. Network Services (ports) low volume of traffic on these ports when INSIDE Text fraction of connections for Microsoft traffic

  17. Network Services (ports) low volume of traffic on these ports when INSIDE Text m o r e less popular p o p u l a r a different view-- “popularity” of the protocols

  18. Conclusions • Behavior is drastically different across all the dimensions studied • Profile constructed from averaged behavior not reflective of any particular environment • No canonical user profile: users vary greatly from each other • Security mechanisms need to be location aware to close “gaps” that can be exploited

  19. Questions Jaideep Chandrashekar jaideep.chandrashekar@intel.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend